Tor is one of the most important Internet services that ensures user anonymity. It is free and can be used by anyone who wants to hide, for example, the public IP address of their computer. The project, intended for good purposes, is also being abused by criminals who seek to remain anonymous and evade law enforcement. German law enforcement agencies decided to put an end to this.

Image source: blog.torproject.org

German law enforcement agencies have been monitoring Tor servers for months to identify individual users of the dark network. They managed to identify the server of the hacker group Vanir Locker, which it used on the Tor network. Cybercriminals have announced that they will publish data stolen during one of their latest attacks. German authorities were able to determine the location of the resource using a time analysis method.

Timing analysis is used to relate connections to the Tor network and local connections to the Internet. To implement this method, as many Tor nodes as possible are monitored because this increases the likelihood of identification. Thus, law enforcement agencies do monitor Tor nodes, and this is not only done in Germany. German specialists seized control of the resource address of a group of cyber extortionists on the Tor network and redirected it to their page – as a result, the hackers were unable to publish data on their resource.

Reporters from state broadcaster ARD have seen documents that confirm the operation successfully identified four individuals. This method was also used to identify participants in a platform where child abuse material was published. The Tor Project confirmed that law enforcement had succeeded in de-anonymizing several cybercriminals, but said that Tor remains one of the best privacy options for most Internet users.

admin

Share
Published by
admin

Recent Posts

Sharp unveils rugged flagship smartphone Aquos R10 with 240Hz screen and more affordable Wish 5

Sharp has unveiled two smartphones to complement its Aquos line: the powerful Aquos R10 and…

12 hours ago

RoadCraft – Restore the Destroyed. Review

Processor Intel Core i5-12600K 3.7 GHz / AMD Ryzen 7 5800X 3.8 GHz, 16 GB…

12 hours ago

Petabyte E2 SSDs are ready to eventually displace HDDs in data centers

The Storage Networking Industry Association (SNIA) and the Open Compute Project (OCP), according to StorageReview,…

12 hours ago

Intel Introduces EMIB-T, a Multi-Chip Packaging Technology Supporting HBM4 and UCIe

At the IEEE ECTC 2025 conference in Dallas in late May, Intel announced EMIB-T, an…

12 hours ago

Slim Galaxy S25 Edge shows surprising durability in bend test and other tests

The ultra-thin Samsung Galaxy S25 Edge smartphone, which went on sale on May 30, demonstrated…

12 hours ago

China’s XPeng Releases $20,000 MONA M03 Max Electric Car With Free Autopilot

Chinese company XPeng has unveiled the MONA M03 Max, a car with an AI-powered autonomous…

2 days ago